{"id":2951,"date":"2025-10-20T10:29:24","date_gmt":"2025-10-20T08:29:24","guid":{"rendered":"https:\/\/datagerry.com\/?p=2951"},"modified":"2026-03-03T11:09:03","modified_gmt":"2026-03-03T10:09:03","slug":"recap-itsa-2025","status":"publish","type":"post","link":"https:\/\/datagerry.com\/en\/recap-itsa-2025\/","title":{"rendered":"it-sa 2025 Recap: Three days of discussions and cybersecurity"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;c88971a3-34dd-4ac2-90f5-9e52ea679f98&#8243; header_2_text_color=&#8221;#4d4d4d&#8221; header_2_font_size=&#8221;22px&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; text_text_color=&#8221;#4D4D4D&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p><strong>it-sa 2025<\/strong> in Nuremberg is over\u2014and it was a resounding success. Three intense days focused on <strong>cybersecurity, compliance, and IT integration<\/strong> are now behind us. For us, the trade fair was not only an opportunity to present our solutions live, but above all a place for professional exchange, inspiration, and encounters.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;2_3,1_3&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;c88971a3-34dd-4ac2-90f5-9e52ea679f98&#8243; header_2_text_color=&#8221;#4d4d4d&#8221; header_2_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; text_text_color=&#8221;#4D4D4D&#8221;]<\/p>\n<h2>it-sa \u2013 Home of Security \u2013 Europe&#8217;s leading trade fair for IT security<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;c88971a3-34dd-4ac2-90f5-9e52ea679f98&#8243; header_2_text_color=&#8221;#4d4d4d&#8221; header_2_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; text_text_color=&#8221;#4D4D4D&#8221;]<\/p>\n<p><strong><a href=\"https:\/\/www.itsa365.de\/de-de\/it-sa-expo-congress\" target=\"_blank\" rel=\"noopener\">it-sa<\/a><\/strong> is considered Europe&#8217;s leading trade fair for IT security. Every year, it attracts thousands of experts from business, government, and research. The focus is on current topics such as cyber defense, data protection, risk and compliance management, and the challenges of modern IT infrastructures. In addition to the exhibitor stands, forums, specialist presentations, and discussion panels offer practical insights into trends and technologies that are shaping the security landscape.   <\/p>\n<p>Once again this year, the trade fair in Nuremberg was a central meeting place for the security community\u2014and we were right in the thick of it.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_image src=&#8221;https:\/\/datagerry.com\/wp-content\/uploads\/2026\/02\/it-sa-logo-1.png&#8221; title_text=&#8221;it-sa-logo&#8221; url=&#8221;https:\/\/www.itsa365.de\/de-de\/it-sa-expo-congress&#8221; url_new_window=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;80%&#8221; module_alignment=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_image src=&#8221;https:\/\/datagerry.com\/wp-content\/uploads\/2026\/02\/it-sa-becongmbh-2.png&#8221; title_text=&#8221;it-sa-becongmbh-2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_image src=&#8221;https:\/\/datagerry.com\/wp-content\/uploads\/2026\/02\/it-sa-becongmbh-13.png&#8221; title_text=&#8221;it-sa-becongmbh-13&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_image src=&#8221;https:\/\/datagerry.com\/wp-content\/uploads\/2026\/02\/it-sa-becongmbh-1.png&#8221; title_text=&#8221;it-sa-becongmbh-1&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||4px|||&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_divider _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; color=&#8221;#E94D18&#8243; sticky_enabled=&#8221;0&#8243;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;c88971a3-34dd-4ac2-90f5-9e52ea679f98&#8243; header_2_text_color=&#8221;#4d4d4d&#8221; header_2_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; text_text_color=&#8221;#4D4D4D&#8221;]<\/p>\n<h2>IT documentation, attack detection, and integration combined<\/h2>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/datagerry.com\/wp-content\/uploads\/2026\/02\/DataGerry-OpenCelium-Wazuh-Grafik.png&#8221; title_text=&#8221;DataGerry-OpenCelium-Wazuh Grafik&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;c88971a3-34dd-4ac2-90f5-9e52ea679f98&#8243; header_2_text_color=&#8221;#4d4d4d&#8221; header_2_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; text_text_color=&#8221;#4D4D4D&#8221;]<\/p>\n<p>Our booth in Hall 7 was well attended throughout the entire trade fair. Interest focused primarily on one topic: How can IT security be designed today so that it functions in an <strong>integrated, transparent, and automated<\/strong> manner? <\/p>\n<p>Our answer to this: With the combination of <strong>DataGerry<\/strong>, <strong>Wazuh<\/strong>, and <strong>OpenCelium<\/strong>\u2014an open, flexible solution that combines documentation, attack detection, and API integration.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||4px|||&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_divider _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; color=&#8221;#E94D18&#8243; sticky_enabled=&#8221;0&#8243;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;2_3,1_3&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_image src=&#8221;https:\/\/datagerry.com\/wp-content\/uploads\/2026\/02\/datagerry-logo-produkte-becon-gmbh.png&#8221; alt=&#8221;Logo des Open Source CMDB Tools DATAGERRY&#8221; title_text=&#8221;datagerry-logo-produkte-becon-gmbh&#8221; url=&#8221;https:\/\/datagerry.com\/&#8221; url_new_window=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||5px||false|false&#8221; custom_padding=&#8221;||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;c88971a3-34dd-4ac2-90f5-9e52ea679f98&#8243; header_2_text_color=&#8221;#4d4d4d&#8221; header_2_font_size=&#8221;22px&#8221; header_3_text_color=&#8221;#4d4d4d&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; text_text_color=&#8221;#4D4D4D&#8221;]<\/p>\n<h3>DataGerry: Central IT documentation and ISMS<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;c88971a3-34dd-4ac2-90f5-9e52ea679f98&#8243; header_2_text_color=&#8221;#4d4d4d&#8221; header_2_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; text_text_color=&#8221;#4D4D4D&#8221;]<\/p>\n<p><strong><a href=\"https:\/\/datagerry.com\" target=\"_blank\" rel=\"noopener\">DataGerry<\/a><\/strong> is our open source CMDB (<a href=\"https:\/\/www.becon.de\/cmdb-documentation\/?lang=en\" target=\"_blank\" rel=\"noopener\">Configuration Management Database<\/a>), which goes far beyond traditional IT documentation. It maps all relevant IT assets in a structured manner\u2014from servers and applications to networks\u2014and provides this information centrally. In addition, DataGerry can be used as an <strong>ISMS<\/strong> (<a href=\"https:\/\/www.becon.de\/information-security\/?lang=en\" target=\"_blank\" rel=\"noopener\">Information Security Management System<\/a>). This provides companies with a flexible platform for mapping and controlling processes, responsibilities, and security measures in accordance with <strong>NIS2<\/strong> or <strong>ISO 27001 requirements<\/strong>.   <\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_image src=&#8221;https:\/\/datagerry.com\/wp-content\/uploads\/2026\/02\/DataGerry-Factsheet-Deutsch.png&#8221; title_text=&#8221;DataGerry-Factsheet-Deutsch&#8221; url=&#8221;https:\/\/datagerry.com\/wp-content\/uploads\/2025\/08\/DataGerry-Factsheet-Deutsch.pdf&#8221; url_new_window=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_image][et_pb_button button_url=&#8221;https:\/\/datagerry.com\/wp-content\/uploads\/2025\/08\/DataGerry-Factsheet-Deutsch.pdf&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;Download fact sheet for free&#8221; disabled_on=&#8221;off|off|off&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;15px&#8221; button_bg_color=&#8221;#E94D18&#8243; button_border_width=&#8221;12px&#8221; button_border_color=&#8221;#E94D18&#8243; button_border_radius=&#8221;6px&#8221; button_font=&#8221;|700|||||||&#8221; button_icon=&#8221;&#x24;||divi||400&#8243; background_layout=&#8221;dark&#8221; custom_margin=&#8221;30px||||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221; theme_builder_area=&#8221;post_content&#8221; button_text_color=&#8221;#FFFFFF&#8221; button_bg_enable_color=&#8221;on&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_image src=&#8221;https:\/\/datagerry.com\/wp-content\/uploads\/2026\/02\/wazuh-produkt-becon-gmbh.jpg&#8221; alt=&#8221;Logo des Open Source CMDB Tools DATAGERRY&#8221; title_text=&#8221;wazuh-produkt-becon-gmbh&#8221; url=&#8221;https:\/\/www.becon.de\/wazuh\/?lang=en&#8221; url_new_window=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||5px|-5px|false|false&#8221; custom_padding=&#8221;||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;c88971a3-34dd-4ac2-90f5-9e52ea679f98&#8243; header_2_text_color=&#8221;#4d4d4d&#8221; header_2_font_size=&#8221;22px&#8221; header_3_text_color=&#8221;#4d4d4d&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; text_text_color=&#8221;#4D4D4D&#8221;]<\/p>\n<h3>Wazuh: Attack detection and security monitoring<\/h3>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;2_3,1_3&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;c88971a3-34dd-4ac2-90f5-9e52ea679f98&#8243; header_2_text_color=&#8221;#4d4d4d&#8221; header_2_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; text_text_color=&#8221;#4D4D4D&#8221;]<\/p>\n<p><strong><a href=\"https:\/\/www.becon.de\/wazuh\/?lang=en\" target=\"_blank\" rel=\"noopener\">Wazuh<\/a><\/strong> complements DataGerry with the operational security layer. The open source security platform monitors systems, analyzes log data, and detects security-related events in real time. Through integration with DataGerry, this information flows directly into the documentation, making attacks or vulnerabilities visible in <strong>context and traceable<\/strong>.  <\/p>\n<p>This aspect is particularly crucial in the context of the <strong><a href=\"https:\/\/www.becon.de\/?page_id=26020237&#038;lang=en\" target=\"_blank\" rel=\"noopener\">NIS2 Directive<\/a><\/strong>: Companies must not only document their IT assets, but also be able to <strong>detect, assess, and verify security incidents<\/strong>.<br \/>Wazuh provides the technical basis for <strong>adequate attack detection<\/strong>, as expressly required by NIS2 \u2013 especially for <strong>critical infrastructure companies<\/strong> or organizations that have taken out <strong>cyber insurance<\/strong>.<br \/>Continuous monitoring and automatic alerts help to shorten response times and provide audit-proof security evidence at all times.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_image src=&#8221;https:\/\/datagerry.com\/wp-content\/uploads\/2026\/02\/wazuh-Factsheet-becon-gmbh.png&#8221; title_text=&#8221;wazuh-Factsheet-becon-gmbh&#8221; url=&#8221;https:\/\/www.becon.de\/wp-content\/uploads\/2025\/09\/wazuh-Factsheet.pdf&#8221; url_new_window=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_image][et_pb_button button_url=&#8221;https:\/\/www.becon.de\/wp-content\/uploads\/2025\/09\/wazuh-Factsheet.pdf&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;Download fact sheet for free&#8221; disabled_on=&#8221;off|off|off&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;15px&#8221; button_bg_color=&#8221;#E94D18&#8243; button_border_width=&#8221;12px&#8221; button_border_color=&#8221;#E94D18&#8243; button_border_radius=&#8221;6px&#8221; button_font=&#8221;|700|||||||&#8221; button_icon=&#8221;&#x24;||divi||400&#8243; background_layout=&#8221;dark&#8221; custom_margin=&#8221;30px||||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221; theme_builder_area=&#8221;post_content&#8221; button_text_color=&#8221;#FFFFFF&#8221; button_bg_enable_color=&#8221;on&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_image src=&#8221;https:\/\/datagerry.com\/wp-content\/uploads\/2026\/02\/opencelium-logo-produkte-becon-gmbh.png&#8221; alt=&#8221;Logo des Open Source API-Management Tools OpenCelium&#8221; title_text=&#8221;opencelium-logo-produkte-becon-gmbh&#8221; url=&#8221;https:\/\/www.opencelium.io\/&#8221; url_new_window=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;c88971a3-34dd-4ac2-90f5-9e52ea679f98&#8243; header_2_text_color=&#8221;#4d4d4d&#8221; header_2_font_size=&#8221;22px&#8221; header_3_text_color=&#8221;#4d4d4d&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; text_text_color=&#8221;#4D4D4D&#8221;]<\/p>\n<h3>OpenCelium: Open Source API Integration<\/h3>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;2_3,1_3&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;c88971a3-34dd-4ac2-90f5-9e52ea679f98&#8243; header_2_text_color=&#8221;#4d4d4d&#8221; header_2_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; text_text_color=&#8221;#4D4D4D&#8221;]<\/p>\n<p>The third component is <strong><a href=\"https:\/\/www.opencelium.io\/\" target=\"_blank\" rel=\"noopener\">OpenCelium<\/a><\/strong>\u2014an <em>API integration platform<\/em>. It connects DataGerry, Wazuh, and other applications within the company via standardized interfaces. This allows security-related data to be <strong>automatically exchanged, enriched, and processed<\/strong>\u2014without manual intervention.  <\/p>\n<p>The result is a seamless flow of information:<\/p>\n<ul>\n<li>Events from Wazuh are automatically transferred to DataGerry.<\/li>\n<li>CMDB data can be transferred to external tools or linked to SIEM systems.<\/li>\n<li>Changes or status information are synchronized.<\/li>\n<\/ul>\n<p>This integration creates transparency and efficiency while reducing the risk of human error. For companies that need to implement NIS2 requirements, this creates a <strong>comprehensive security architecture<\/strong> that combines documentation, attack detection, and integration on a single platform. <\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_image src=&#8221;https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/OpenCelium-Factsheet.png&#8221; title_text=&#8221;OpenCelium-Factsheet&#8221; url=&#8221;https:\/\/www.becon.de\/wp-content\/uploads\/2025\/07\/Factsheet-OpenCelium-becon-gmbh.pdf&#8221; url_new_window=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_image][et_pb_button button_url=&#8221;https:\/\/www.becon.de\/wp-content\/uploads\/2025\/07\/Factsheet-OpenCelium-becon-gmbh.pdf&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;Download fact sheet for free&#8221; disabled_on=&#8221;off|off|off&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;15px&#8221; button_bg_color=&#8221;#E94D18&#8243; button_border_width=&#8221;12px&#8221; button_border_color=&#8221;#E94D18&#8243; button_border_radius=&#8221;6px&#8221; button_font=&#8221;|700|||||||&#8221; button_icon=&#8221;&#x24;||divi||400&#8243; background_layout=&#8221;dark&#8221; custom_margin=&#8221;30px||||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221; theme_builder_area=&#8221;post_content&#8221; button_text_color=&#8221;#FFFFFF&#8221; button_bg_enable_color=&#8221;on&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||4px|||&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_divider _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; color=&#8221;#E94D18&#8243; sticky_enabled=&#8221;0&#8243;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;c88971a3-34dd-4ac2-90f5-9e52ea679f98&#8243; header_2_text_color=&#8221;#4d4d4d&#8221; header_2_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; text_text_color=&#8221;#4D4D4D&#8221;]<\/p>\n<h2>NIS2 in practice: A one-stop solution for security and compliance<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;c88971a3-34dd-4ac2-90f5-9e52ea679f98&#8243; header_2_text_color=&#8221;#4d4d4d&#8221; header_2_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; text_text_color=&#8221;#4D4D4D&#8221;]<\/p>\n<p>One highlight of the trade fair was our presentation <strong>\u201cImplementing NIS2 with DataGerry \u2013 CMDB, ISMS &amp; attack detection as a one-stop solution.\u201d<\/strong> Our expert <strong>Kai Schubert-Altmann<\/strong> showed how companies can use this combination to master the balancing act between compliance and operational security. <\/p>\n<p>[\/et_pb_text][et_pb_video src=&#8221;https:\/\/youtu.be\/O7FRW_e03qs&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_video][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;c88971a3-34dd-4ac2-90f5-9e52ea679f98&#8243; header_2_text_color=&#8221;#4d4d4d&#8221; header_2_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; text_text_color=&#8221;#4D4D4D&#8221;]<\/p>\n<p>The requirements of the EU NIS2 Directive are clear: companies must know their IT assets, assess risks, document security measures, and make security incidents traceable.<\/p>\n<p>With DataGerry, Wazuh, and OpenCelium, this process can be mapped completely digitally:<\/p>\n<ol>\n<li><strong>Documentation &amp; transparency:<\/strong> All systems, dependencies, and responsibilities are centrally recorded in the CMDB.<\/li>\n<li><strong>Attack detection:<\/strong> Security events are automatically detected, documented, and evaluated\u2014a key component of NIS2 compliance.<\/li>\n<li><strong>Integration:<\/strong> OpenCelium integrates information from other tools to create a complete security ecosystem.<\/li>\n<\/ol>\n<p>This solution is not only technically elegant, but also makes good business sense\u2014especially for organizations that want to rely on open, scalable systems.<\/p>\n<p>\u27a1\ufe0f <strong><a href=\"https:\/\/www.becon.de\/nis2-checklist-for-compliance-with-the-new-eu-directive\/?lang=en\" target=\"_blank\" rel=\"noopener\">More tips on the practical implementation of the NIS2 Directive in our free checklist.<\/a><\/strong><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||4px|||&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_divider _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; color=&#8221;#E94D18&#8243; sticky_enabled=&#8221;0&#8243;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;c88971a3-34dd-4ac2-90f5-9e52ea679f98&#8243; header_2_text_color=&#8221;#4d4d4d&#8221; header_2_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; text_text_color=&#8221;#4D4D4D&#8221;]<\/p>\n<h2>Dialogue, practical relevance, and new ideas<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;c88971a3-34dd-4ac2-90f5-9e52ea679f98&#8243; header_2_text_color=&#8221;#4d4d4d&#8221; header_2_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; text_text_color=&#8221;#4D4D4D&#8221;]<\/p>\n<p>In addition to the technical topics, the trade fair was above all one thing: a place for exchange. Whether it was about CMDB strategies, attack detection, or API integration, the discussions at our booth showed how great the need is for practical, open solutions. The positive response and interest in DataGerry, Wazuh, and OpenCelium confirm our decision to continue consistently along this path.  <\/p>\n<p>We were also particularly pleased to see our partners from the <strong><a href=\"https:\/\/www.i-doit.com\/ressourcen\/partner?_gl=1*1awm2jv*_up*MQ..*_ga*MTc3MDQyMzYzMC4xNzYwNDI4Nzgz*_ga_S99SNT1QF9*czE3NjA0Mjg3ODMkbzEkZzEkdDE3NjA0Mjg3ODMkajYwJGwwJGg5MDMwNjQ5NjM.\" target=\"_blank\" rel=\"noopener\">i-doit Group<\/a><\/strong>, <a href=\"https:\/\/www.kixdesk.com\/ueber-uns\/partner\/becon\" target=\"_blank\" rel=\"noopener\"><strong>KIX<\/strong><\/a>, and <strong><a href=\"https:\/\/www.loginventory.de\/\" target=\"_blank\" rel=\"noopener\">LOGINventory<\/a><\/strong> again. Every year, it-sa offers an excellent opportunity to nurture existing partnerships, exchange ideas, and gain new inspiration from the community. <\/p>\n<p>For us, the personal contact with customers, partners, and interested parties was a valuable experience. We will continue many of these discussions in the coming weeks\u2014with new ideas, perspectives, and concrete solutions. <\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||4px|||&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_divider _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; color=&#8221;#E94D18&#8243; sticky_enabled=&#8221;0&#8243;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;c88971a3-34dd-4ac2-90f5-9e52ea679f98&#8243; header_2_text_color=&#8221;#4d4d4d&#8221; header_2_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; text_text_color=&#8221;#4D4D4D&#8221;]<\/p>\n<h2>Conclusion: Three successful days full of energy and inspiration<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;c88971a3-34dd-4ac2-90f5-9e52ea679f98&#8243; header_2_text_color=&#8221;#4d4d4d&#8221; header_2_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; text_text_color=&#8221;#4D4D4D&#8221;]<\/p>\n<p>For us, <strong>it-sa 2025<\/strong> was more than just a trade fair\u2014it was an intensive insight into the current challenges and opportunities in the world of IT security.<\/p>\n<p>A big thank you goes out to all visitors, partners, and colleagues who made these three days a real highlight.<\/p>\n<p>We are already looking forward to <strong>it-sa 2026<\/strong> \u2013 and to continuing the dialogue on secure, integrated, and open IT systems.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_4,1_4,1_4,1_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_image src=&#8221;https:\/\/datagerry.com\/wp-content\/uploads\/2026\/02\/it-sa-becongmbh-9.png&#8221; title_text=&#8221;it-sa-becongmbh-9&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_image src=&#8221;https:\/\/datagerry.com\/wp-content\/uploads\/2026\/02\/it-sa-becongmh-10.png&#8221; title_text=&#8221;it-sa-becongmh-10&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_image src=&#8221;https:\/\/datagerry.com\/wp-content\/uploads\/2026\/02\/it-sa-becongmbh-3.png&#8221; title_text=&#8221;it-sa-becongmbh-3&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_image src=&#8221;https:\/\/datagerry.com\/wp-content\/uploads\/2026\/02\/it-sa-becongmbh-8.png&#8221; title_text=&#8221;it-sa-becongmbh-8&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_4,1_4,1_4,1_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_image src=&#8221;https:\/\/datagerry.com\/wp-content\/uploads\/2026\/02\/it-sa-becongmbh-7.png&#8221; title_text=&#8221;it-sa-becongmbh-7&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_image src=&#8221;https:\/\/datagerry.com\/wp-content\/uploads\/2026\/02\/it-sa-becongmbh-15.png&#8221; title_text=&#8221;it-sa-becongmbh-15&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_image src=&#8221;https:\/\/datagerry.com\/wp-content\/uploads\/2026\/02\/it-sa-becongmbh-16.png&#8221; title_text=&#8221;it-sa-becongmbh-16&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_image src=&#8221;https:\/\/datagerry.com\/wp-content\/uploads\/2026\/02\/it-sa-becongmbh-14.png&#8221; title_text=&#8221;it-sa-becongmbh-14&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>How can IT security be designed to function in an integrated, transparent, and automated way today? With the combination of DataGerry, Wazuh, and OpenCelium \u2013 an open, flexible solution that combines documentation, attack detection, and API integration.<\/p>\n","protected":false},"author":9,"featured_media":2897,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<img width=\"850\" height=\"513\" src=\"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/it-sa-Recap-2025-becongmbh.png\" alt=\"DataGerry team at it-sa 2025\" srcset=\"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/it-sa-Recap-2025-becongmbh.png 850w, https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/it-sa-Recap-2025-becongmbh-300x181.png 300w, https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/it-sa-Recap-2025-becongmbh-768x464.png 768w\" sizes=\"(max-width: 850px) 100vw, 850px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t<p>Die <strong>it-sa 2025<\/strong> in N\u00fcrnberg ist vorbei \u2013 und sie war ein voller Erfolg. Drei intensive Tage im Zeichen von <strong>Cybersecurity, Compliance und IT-Integration<\/strong> liegen hinter uns. F\u00fcr uns war die Messe nicht nur eine Gelegenheit, unsere L\u00f6sungen live zu pr\u00e4sentieren, sondern vor allem ein Ort des fachlichen Austauschs, der Inspiration und der Begegnung.<\/p>\n<h2>it-sa \u2013 Home of Security \u2013 Europas Leitmesse f\u00fcr IT-Security<\/h2>\n<p>Die <a href=\"https:\/\/www.itsa365.de\/de-de\/it-sa-expo-congress\"><strong>it-sa<\/strong><\/a> gilt als Europas f\u00fchrende Fachmesse f\u00fcr IT-Sicherheit. Jahr f\u00fcr Jahr zieht sie tausende Expertinnen und Experten aus Unternehmen, Verwaltung und Forschung an. Im Fokus stehen aktuelle Themen wie Cyber-Defense, Datenschutz, Risiko- und Compliance-Management sowie die Herausforderungen moderner IT-Infrastrukturen. Neben den Ausstellerst\u00e4nden bieten Foren, Fachvortr\u00e4ge und Diskussionsrunden praxisnahe Einblicke in Trends und Technologien, die die Sicherheitslandschaft pr\u00e4gen.<\/p>\n<p>Auch in diesem Jahr war die Messe in N\u00fcrnberg wieder ein zentraler Treffpunkt f\u00fcr die Security-Community \u2013 und wir waren mittendrin.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img width=\"350\" height=\"273\" src=\"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/09\/it-sa-logo-4.png\" alt=\"\" srcset=\"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/09\/it-sa-logo-4.png 350w, https:\/\/datagerry.com\/wp-content\/uploads\/2025\/09\/it-sa-logo-4-300x234.png 300w\" sizes=\"(max-width: 350px) 100vw, 350px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img width=\"850\" height=\"513\" src=\"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/it-sa-becongmbh-2.png\" alt=\"\" srcset=\"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/it-sa-becongmbh-2.png 850w, https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/it-sa-becongmbh-2-300x181.png 300w, https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/it-sa-becongmbh-2-768x464.png 768w\" sizes=\"(max-width: 850px) 100vw, 850px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img width=\"850\" height=\"513\" src=\"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/it-sa-becongmbh-13.png\" alt=\"DataGerry at it-sa 2025\" srcset=\"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/it-sa-becongmbh-13.png 850w, https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/it-sa-becongmbh-13-300x181.png 300w, https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/it-sa-becongmbh-13-768x464.png 768w\" sizes=\"(max-width: 850px) 100vw, 850px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img width=\"850\" height=\"513\" src=\"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/it-sa-becongmbh-1.png\" alt=\"DataGerry team at it-sa 2025\" srcset=\"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/it-sa-becongmbh-1.png 850w, https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/it-sa-becongmbh-1-300x181.png 300w, https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/it-sa-becongmbh-1-768x464.png 768w\" sizes=\"(max-width: 850px) 100vw, 850px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t<h2>IT-Dokumentation, Angriffserkennung und Integration vereint<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img width=\"850\" height=\"513\" src=\"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/DataGerry-OpenCelium-Wazuh-Grafik.png\" alt=\"CMDB and ISMS with DataGerry, API Integration with OpenCelium, Intrusion Detection with Wazuh\" srcset=\"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/DataGerry-OpenCelium-Wazuh-Grafik.png 850w, https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/DataGerry-OpenCelium-Wazuh-Grafik-300x181.png 300w, https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/DataGerry-OpenCelium-Wazuh-Grafik-768x464.png 768w\" sizes=\"(max-width: 850px) 100vw, 850px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t<p>Unser Stand in Halle 7 war w\u00e4hrend der gesamten Messe gut besucht. Das Interesse galt vor allem einem Thema: Wie l\u00e4sst sich IT-Sicherheit heute so gestalten, dass sie <strong>integriert, transparent und automatisiert<\/strong> funktioniert?<\/p>\n<p>Unsere Antwort darauf: Mit dem Zusammenspiel aus <strong>DataGerry<\/strong>, <strong>Wazuh<\/strong> und <strong>OpenCelium<\/strong> \u2013 einer offenen, flexiblen L\u00f6sung, die Dokumentation, Angriffserkennung und API Integration vereint.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img width=\"359\" height=\"108\" src=\"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/Datagerry.png\" alt=\"\" srcset=\"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/Datagerry.png 359w, https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/Datagerry-300x90.png 300w\" sizes=\"(max-width: 359px) 100vw, 359px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t<p><strong>DataGerry: Zentrale IT-Dokumentation und ISMS<\/strong><\/p>\n<p><a href=\"https:\/\/datagerry.com\"><strong>DataGerry<\/strong><\/a> ist unsere Open Source CMDB (<a href=\"https:\/\/www.becon.de\/cmdb-dokumentation\/\">Configuration Management Database<\/a>), die weit \u00fcber klassische IT-Dokumentation hinausgeht. Sie bildet alle relevanten IT-Assets strukturiert ab \u2013 von Servern \u00fcber Anwendungen bis hin zu Netzwerken \u2013 und stellt diese Informationen zentral bereit. Dar\u00fcber hinaus kann DataGerry als <strong>ISMS <\/strong>(<a href=\"https:\/\/www.becon.de\/iso27001-audit-und-isms-audit\/\">Information Security Management System<\/a>) genutzt werden. Unternehmen erhalten damit eine flexible Plattform, um Prozesse, Verantwortlichkeiten und Sicherheitsma\u00dfnahmen im Sinne der <strong>NIS2- <\/strong>oder<strong> ISO-27001-Vorgaben<\/strong> abzubilden und zu steuern.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/08\/DataGerry-Factsheet-Deutsch.pdf?_gl=1*tqngf7*_ga*MTQyMTA5NzA1OC4xNzYwNjc5OTY2*_ga_Z8MB6N76ME*czE3NjA2OTM3MTIkbzMkZzEkdDE3NjA2OTUwMDYkajYwJGwwJGgw*_gcl_au*MTQ1Njg0MTUxOC4xNzYwNjc5OTY2\">\n\t\t\t\t\t\t\t<img width=\"300\" height=\"300\" src=\"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/08\/DataGerry-Factsheet-Deutsch.png\" alt=\"\" srcset=\"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/08\/DataGerry-Factsheet-Deutsch.png 300w, https:\/\/datagerry.com\/wp-content\/uploads\/2025\/08\/DataGerry-Factsheet-Deutsch-150x150.png 150w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<a href=\"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/08\/DataGerry-Factsheet-Deutsch.pdf?_gl=1*7ck9qc*_ga*MTQyMTA5NzA1OC4xNzYwNjc5OTY2*_ga_Z8MB6N76ME*czE3NjA2OTM3MTIkbzMkZzAkdDE3NjA2OTM3MTIkajYwJGwwJGgw*_gcl_au*MTQ1Njg0MTUxOC4xNzYwNjc5OTY2\">\n\t\t\t\t\t\t\t\t\tFact Sheet kostenlos herunterladen\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img width=\"300\" height=\"65\" src=\"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/09\/Wazuh-Logo.png\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t<p><strong>Wazuh: Angriffserkennung und Security Monitoring<\/strong><\/p>\n<p><a href=\"https:\/\/www.becon.de\/wazuh\/\"><strong>Wazuh<\/strong><\/a> erg\u00e4nzt DataGerry um die operative Sicherheitsebene. Die Open Source Sicherheitsplattform \u00fcberwacht Systeme, analysiert Logdaten und erkennt sicherheitsrelevante Ereignisse in Echtzeit. \u00dcber die Integration in DataGerry flie\u00dfen diese Informationen direkt in die Dokumentation ein \u2013 Angriffe oder Schwachstellen werden so <strong>kontextbezogen und nachvollziehbar<\/strong> sichtbar.<\/p>\n<p>Gerade im Rahmen der <a href=\"https:\/\/www.becon.de\/nis2\/\"><strong>NIS2-Richtlinie<\/strong><\/a> ist dieser Aspekt entscheidend: Unternehmen m\u00fcssen nicht nur ihre IT-Assets dokumentieren, sondern auch in der Lage sein, <strong>Sicherheitsvorf\u00e4lle zu erkennen, zu bewerten und nachzuweisen<\/strong>.<br \/>Wazuh liefert hier die technische Grundlage f\u00fcr eine <strong>angemessene Angriffserkennung<\/strong>, wie sie von NIS2 ausdr\u00fccklich gefordert wird \u2013 insbesondere f\u00fcr <strong>KRITIS-Unternehmen<\/strong> oder Organisationen, die eine <strong>Cyberversicherung<\/strong> abgeschlossen haben.<br \/>Die kontinuierliche \u00dcberwachung und automatische Alarmierung helfen dabei, Reaktionszeiten zu verk\u00fcrzen und Sicherheitsnachweise jederzeit revisionssicher zu erbringen.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.becon.de\/wp-content\/uploads\/2025\/09\/wazuh-Factsheet.pdf\">\n\t\t\t\t\t\t\t<img width=\"300\" height=\"300\" src=\"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/wazuh-Factsheet-becon-gmbh.png\" alt=\"wazuh Fact Sheet\" srcset=\"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/wazuh-Factsheet-becon-gmbh.png 300w, https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/wazuh-Factsheet-becon-gmbh-150x150.png 150w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<a href=\"https:\/\/www.becon.de\/wp-content\/uploads\/2025\/09\/wazuh-Factsheet.pdf\">\n\t\t\t\t\t\t\t\t\tFact Sheet kostenlos herunterladen\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img width=\"250\" height=\"75\" src=\"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/09\/opencelium-gmbh-logo.png\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t<p><strong>OpenCelium: Open Source API Integration<\/strong><\/p>\n<p>Der dritte Baustein ist <a href=\"https:\/\/www.opencelium.io\/\"><strong>OpenCelium<\/strong><\/a> \u2013 eine <em>API Integration Platform<\/em>. \u00dcber standardisierte Schnittstellen verbindet sie DataGerry, Wazuh und andere Anwendungen im Unternehmen miteinander. So werden sicherheitsrelevante Daten <strong>automatisiert ausgetauscht, angereichert und weiterverarbeitet<\/strong> \u2013 ohne manuelle Eingriffe.<\/p>\n<p>Das Ergebnis ist ein nahtloser Informationsfluss:<\/p>\n<ul>\n<li>Ereignisse aus Wazuh werden automatisch in DataGerry \u00fcbernommen.<\/li>\n<li>CMDB-Daten k\u00f6nnen an externe Tools \u00fcbergeben oder mit SIEM-Systemen verkn\u00fcpft werden.<\/li>\n<li>\u00c4nderungen oder Statusinformationen werden synchronisiert.<\/li>\n<\/ul>\n<p>Diese Integration schafft Transparenz, Effizienz und reduziert zugleich das Risiko menschlicher Fehler. F\u00fcr Unternehmen, die NIS2-Anforderungen umsetzen m\u00fcssen, entsteht so eine <strong>durchg\u00e4ngige Sicherheitsarchitektur<\/strong>, die Dokumentation, Angriffserkennung und Integration auf einer Plattform vereint.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.becon.de\/wp-content\/uploads\/2025\/07\/Factsheet-OpenCelium-becon-gmbh.pdf\">\n\t\t\t\t\t\t\t<img width=\"300\" height=\"300\" src=\"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/OpenCelium-Factsheet.png\" alt=\"OpenCelium Fact Sheet\" srcset=\"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/OpenCelium-Factsheet.png 300w, https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/OpenCelium-Factsheet-150x150.png 150w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<a href=\"https:\/\/www.becon.de\/wp-content\/uploads\/2025\/07\/Factsheet-OpenCelium-becon-gmbh.pdf\">\n\t\t\t\t\t\t\t\t\tFact Sheet kostenlos herunterladen\n\t\t\t\t\t<\/a>\n\t\t<h2>NIS2 in der Praxis: Eine One-Stop-L\u00f6sung f\u00fcr Sicherheit und Compliance<\/h2>\n<p>Ein H\u00f6hepunkt der Messe war unser Vortrag <strong>\u201eNIS2 umsetzen mit DataGerry \u2013 CMDB, ISMS &amp; Angriffserkennung als One-Stop-L\u00f6sung\u201c<\/strong>. Unser Experte <strong>Kai Schubert-Altmann<\/strong> zeigte, wie Unternehmen mit dieser Kombination den Spagat zwischen Compliance und operativer Sicherheit meistern k\u00f6nnen.<\/p>\nhttps:\/\/www.youtube.com\/watch?v=O7FRW_e03qs<p>Denn die Anforderungen der <strong>EU-NIS2-Richtlinie<\/strong> sind klar: Unternehmen m\u00fcssen ihre IT-Assets kennen, Risiken bewerten, Sicherheitsma\u00dfnahmen dokumentieren und Sicherheitsvorf\u00e4lle nachvollziehbar machen.<\/p>\n<p>Mit DataGerry, Wazuh und OpenCelium l\u00e4sst sich dieser Prozess vollst\u00e4ndig digital abbilden:<\/p>\n<ol>\n<li><strong>Dokumentation &amp; Transparenz:<\/strong> Alle Systeme, Abh\u00e4ngigkeiten und Verantwortlichkeiten sind zentral in der CMDB erfasst.<\/li>\n<li><strong>Angriffserkennung:<\/strong> Sicherheitsereignisse werden automatisiert erkannt, dokumentiert und bewertet \u2013 ein zentraler Bestandteil der NIS2-Compliance.<\/li>\n<li><strong>Integration:<\/strong> \u00dcber OpenCelium werden Informationen aus anderen Tools eingebunden, um ein vollst\u00e4ndiges Sicherheits-\u00d6kosystem zu schaffen.<\/li>\n<\/ol>\n<p>Diese L\u00f6sung ist nicht nur technisch elegant, sondern auch wirtschaftlich sinnvoll \u2013 insbesondere f\u00fcr Organisationen, die auf offene, skalierbare Systeme setzen wollen.<\/p>\n<p><a href=\"https:\/\/www.becon.de\/nis2-checkliste\/\">Mehr Tipps zur praktischen Umsetzung der NIS2-Richtlinie in unserer kostenlosen Checkliste<\/a><\/p>\n\t\t<h2>Dialog, Praxisn\u00e4he und neue Impulse<\/h2>\n<p>Neben den Fachthemen war die Messe vor allem eines: ein Ort des Austauschs. Ob zu CMDB-Strategien, Angriffserkennung oder API-Integration \u2013 die Gespr\u00e4che an unserem Stand zeigten, wie gro\u00df der Bedarf an praxisnahen, offenen L\u00f6sungen ist.<\/p>\n<p>Die positive Resonanz und das Interesse an DataGerry, Wazuh und OpenCelium best\u00e4tigen uns darin, diesen Weg konsequent weiterzugehen.<\/p>\n<p>Besonders gefreut haben wir uns auch \u00fcber das Wiedersehen mit unseren Partnern von der <a href=\"https:\/\/www.i-doit.com\/ressourcen\/partner?_gl=1*1awm2jv*_up*MQ..*_ga*MTc3MDQyMzYzMC4xNzYwNDI4Nzgz*_ga_S99SNT1QF9*czE3NjA0Mjg3ODMkbzEkZzEkdDE3NjA0Mjg3ODMkajYwJGwwJGg5MDMwNjQ5NjM.\"><strong>i-doit Group<\/strong><\/a>, von <strong><a href=\"https:\/\/www.kixdesk.com\/ueber-uns\/partner\/becon\">KIX<\/a>, <a href=\"https:\/\/www.loginventory.de\/\">LOGINventory <\/a><\/strong>und<strong> Sumo Logic<\/strong>. Die it-sa bietet jedes Jahr eine hervorragende Gelegenheit, bestehende Partnerschaften zu pflegen, sich auszutauschen und neue Impulse aus der Community mitzunehmen.<\/p>\n<p>F\u00fcr uns war der pers\u00f6nliche Kontakt mit Kund*innen, Partnern und Interessierten eine wertvolle Erfahrung. Viele der Gespr\u00e4che werden wir in den kommenden Wochen weiterf\u00fchren \u2013 mit neuen Ideen, Perspektiven und konkreten L\u00f6sungen.<\/p>\n\t\t<h2>Fazit: Drei erfolgreiche Tage voller Energie und Inspiration<\/h2>\n<p>Die <strong>it-sa 2025<\/strong> war f\u00fcr uns mehr als nur eine Messe \u2013 sie war ein intensiver Einblick in die aktuellen Herausforderungen und Chancen der IT-Security-Welt.<\/p>\n<p>Ein herzlicher Dank geht an alle Besucherinnen und Besucher, Partner und Kolleg*innen, die diese drei Tage zu einem echten Highlight gemacht haben.<\/p>\n<p>Wir freuen uns schon jetzt auf die <strong>it-sa 2026<\/strong> \u2013 und darauf, den Dialog rund um sichere, integrierte und offene IT-Systeme weiterzuf\u00fchren.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img width=\"513\" height=\"850\" src=\"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/it-sa-becongmbh-9.png\" alt=\"Kai Schubert-Altmann from the DataGerry team at it-sa 2025\" srcset=\"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/it-sa-becongmbh-9.png 513w, https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/it-sa-becongmbh-9-181x300.png 181w\" sizes=\"(max-width: 513px) 100vw, 513px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img width=\"513\" height=\"850\" src=\"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/it-sa-becongmh-10.png\" alt=\"Christian Michel from the DataGerry team at it-sa 2025\" srcset=\"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/it-sa-becongmh-10.png 513w, https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/it-sa-becongmh-10-181x300.png 181w\" sizes=\"(max-width: 513px) 100vw, 513px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img width=\"513\" height=\"850\" src=\"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/it-sa-becongmbh-3.png\" alt=\"\" srcset=\"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/it-sa-becongmbh-3.png 513w, https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/it-sa-becongmbh-3-181x300.png 181w\" sizes=\"(max-width: 513px) 100vw, 513px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img width=\"513\" height=\"850\" src=\"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/it-sa-becongmbh-8.png\" alt=\"Christian Michel from the DataGerry team at it-sa 2025\" srcset=\"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/it-sa-becongmbh-8.png 513w, https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/it-sa-becongmbh-8-181x300.png 181w\" sizes=\"(max-width: 513px) 100vw, 513px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img width=\"513\" height=\"850\" src=\"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/it-sa-becongmbh-7.png\" alt=\"\" srcset=\"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/it-sa-becongmbh-7.png 513w, https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/it-sa-becongmbh-7-181x300.png 181w\" sizes=\"(max-width: 513px) 100vw, 513px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img width=\"513\" height=\"850\" src=\"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/it-sa-becongmbh-15.png\" alt=\"\" srcset=\"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/it-sa-becongmbh-15.png 513w, https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/it-sa-becongmbh-15-181x300.png 181w\" sizes=\"(max-width: 513px) 100vw, 513px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img width=\"513\" height=\"850\" src=\"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/it-sa-becongmbh-16.png\" alt=\"\" srcset=\"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/it-sa-becongmbh-16.png 513w, https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/it-sa-becongmbh-16-181x300.png 181w\" sizes=\"(max-width: 513px) 100vw, 513px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img width=\"513\" height=\"850\" src=\"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/it-sa-becongmbh-14.png\" alt=\"DataGerry Candy Bar - Your IT is driving you nuts?\" srcset=\"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/it-sa-becongmbh-14.png 513w, https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/it-sa-becongmbh-14-181x300.png 181w\" sizes=\"(max-width: 513px) 100vw, 513px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t<h2>Kontakt<\/h2>\t\t\t\t\n\t\t\t\t\t<br>","_et_gb_content_width":"","content-type":"","footnotes":""},"categories":[65],"tags":[],"class_list":["post-2951","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-events"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>it-sa 2025 Recap: Three days of discussions and cybersecurity<\/title>\n<meta name=\"description\" content=\"it-sa 2025: IT security \u2013 integrated, transparent, and automated with the combination of DataGerry, Wazuh, and OpenCelium\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/datagerry.com\/en\/recap-itsa-2025\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"it-sa 2025 Recap: Three days of discussions and cybersecurity\" \/>\n<meta property=\"og:description\" content=\"it-sa 2025: IT security \u2013 integrated, transparent, and automated with the combination of DataGerry, Wazuh, and OpenCelium\" \/>\n<meta property=\"og:url\" content=\"https:\/\/datagerry.com\/en\/recap-itsa-2025\/\" \/>\n<meta property=\"og:site_name\" content=\"DataGerry\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-20T08:29:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-03T10:09:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/it-sa-Recap-2025-becongmbh.png\" \/>\n\t<meta property=\"og:image:width\" content=\"850\" \/>\n\t<meta property=\"og:image:height\" content=\"513\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Melina Rother\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@DATAGERRY\" \/>\n<meta name=\"twitter:site\" content=\"@DATAGERRY\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Melina Rother\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/datagerry.com\\\/en\\\/recap-itsa-2025\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/datagerry.com\\\/en\\\/recap-itsa-2025\\\/\"},\"author\":{\"name\":\"Melina Rother\",\"@id\":\"https:\\\/\\\/datagerry.com\\\/en\\\/#\\\/schema\\\/person\\\/4c268fa52a381d91e25e47fbfeb11f81\"},\"headline\":\"it-sa 2025 Recap: Three days of discussions and cybersecurity\",\"datePublished\":\"2025-10-20T08:29:24+00:00\",\"dateModified\":\"2026-03-03T10:09:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/datagerry.com\\\/en\\\/recap-itsa-2025\\\/\"},\"wordCount\":4393,\"publisher\":{\"@id\":\"https:\\\/\\\/datagerry.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/datagerry.com\\\/en\\\/recap-itsa-2025\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/datagerry.com\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/it-sa-Recap-2025-becongmbh.png\",\"articleSection\":[\"Events\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/datagerry.com\\\/en\\\/recap-itsa-2025\\\/\",\"url\":\"https:\\\/\\\/datagerry.com\\\/en\\\/recap-itsa-2025\\\/\",\"name\":\"it-sa 2025 Recap: Three days of discussions and cybersecurity\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/datagerry.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/datagerry.com\\\/en\\\/recap-itsa-2025\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/datagerry.com\\\/en\\\/recap-itsa-2025\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/datagerry.com\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/it-sa-Recap-2025-becongmbh.png\",\"datePublished\":\"2025-10-20T08:29:24+00:00\",\"dateModified\":\"2026-03-03T10:09:03+00:00\",\"description\":\"it-sa 2025: IT security \u2013 integrated, transparent, and automated with the combination of DataGerry, Wazuh, and OpenCelium\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/datagerry.com\\\/en\\\/recap-itsa-2025\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/datagerry.com\\\/en\\\/recap-itsa-2025\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/datagerry.com\\\/en\\\/recap-itsa-2025\\\/#primaryimage\",\"url\":\"https:\\\/\\\/datagerry.com\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/it-sa-Recap-2025-becongmbh.png\",\"contentUrl\":\"https:\\\/\\\/datagerry.com\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/it-sa-Recap-2025-becongmbh.png\",\"width\":850,\"height\":513,\"caption\":\"DataGerry team at it-sa 2025\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/datagerry.com\\\/en\\\/recap-itsa-2025\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/datagerry.com\\\/en\\\/home\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"it-sa 2025 Recap: Three days of discussions and cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/datagerry.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/datagerry.com\\\/en\\\/\",\"name\":\"DataGerry\",\"description\":\"Your IT is driving you nuts?\",\"publisher\":{\"@id\":\"https:\\\/\\\/datagerry.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/datagerry.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/datagerry.com\\\/en\\\/#organization\",\"name\":\"DataGerry\",\"url\":\"https:\\\/\\\/datagerry.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/datagerry.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/datagerry.com\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Datagerry.png\",\"contentUrl\":\"https:\\\/\\\/datagerry.com\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Datagerry.png\",\"width\":359,\"height\":108,\"caption\":\"DataGerry\"},\"image\":{\"@id\":\"https:\\\/\\\/datagerry.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/DATAGERRY\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/datagerry\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/datagerry.com\\\/en\\\/#\\\/schema\\\/person\\\/4c268fa52a381d91e25e47fbfeb11f81\",\"name\":\"Melina Rother\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8a586590524458bd6067e26b9e6e30791bb656f98fbc6eeb7724daeac9f535ff?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8a586590524458bd6067e26b9e6e30791bb656f98fbc6eeb7724daeac9f535ff?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8a586590524458bd6067e26b9e6e30791bb656f98fbc6eeb7724daeac9f535ff?s=96&d=mm&r=g\",\"caption\":\"Melina Rother\"},\"url\":\"https:\\\/\\\/datagerry.com\\\/en\\\/author\\\/rother\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"it-sa 2025 Recap: Three days of discussions and cybersecurity","description":"it-sa 2025: IT security \u2013 integrated, transparent, and automated with the combination of DataGerry, Wazuh, and OpenCelium","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/datagerry.com\/en\/recap-itsa-2025\/","og_locale":"en_US","og_type":"article","og_title":"it-sa 2025 Recap: Three days of discussions and cybersecurity","og_description":"it-sa 2025: IT security \u2013 integrated, transparent, and automated with the combination of DataGerry, Wazuh, and OpenCelium","og_url":"https:\/\/datagerry.com\/en\/recap-itsa-2025\/","og_site_name":"DataGerry","article_published_time":"2025-10-20T08:29:24+00:00","article_modified_time":"2026-03-03T10:09:03+00:00","og_image":[{"width":850,"height":513,"url":"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/it-sa-Recap-2025-becongmbh.png","type":"image\/png"}],"author":"Melina Rother","twitter_card":"summary_large_image","twitter_creator":"@DATAGERRY","twitter_site":"@DATAGERRY","twitter_misc":{"Written by":"Melina Rother","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/datagerry.com\/en\/recap-itsa-2025\/#article","isPartOf":{"@id":"https:\/\/datagerry.com\/en\/recap-itsa-2025\/"},"author":{"name":"Melina Rother","@id":"https:\/\/datagerry.com\/en\/#\/schema\/person\/4c268fa52a381d91e25e47fbfeb11f81"},"headline":"it-sa 2025 Recap: Three days of discussions and cybersecurity","datePublished":"2025-10-20T08:29:24+00:00","dateModified":"2026-03-03T10:09:03+00:00","mainEntityOfPage":{"@id":"https:\/\/datagerry.com\/en\/recap-itsa-2025\/"},"wordCount":4393,"publisher":{"@id":"https:\/\/datagerry.com\/en\/#organization"},"image":{"@id":"https:\/\/datagerry.com\/en\/recap-itsa-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/it-sa-Recap-2025-becongmbh.png","articleSection":["Events"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/datagerry.com\/en\/recap-itsa-2025\/","url":"https:\/\/datagerry.com\/en\/recap-itsa-2025\/","name":"it-sa 2025 Recap: Three days of discussions and cybersecurity","isPartOf":{"@id":"https:\/\/datagerry.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/datagerry.com\/en\/recap-itsa-2025\/#primaryimage"},"image":{"@id":"https:\/\/datagerry.com\/en\/recap-itsa-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/it-sa-Recap-2025-becongmbh.png","datePublished":"2025-10-20T08:29:24+00:00","dateModified":"2026-03-03T10:09:03+00:00","description":"it-sa 2025: IT security \u2013 integrated, transparent, and automated with the combination of DataGerry, Wazuh, and OpenCelium","breadcrumb":{"@id":"https:\/\/datagerry.com\/en\/recap-itsa-2025\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/datagerry.com\/en\/recap-itsa-2025\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/datagerry.com\/en\/recap-itsa-2025\/#primaryimage","url":"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/it-sa-Recap-2025-becongmbh.png","contentUrl":"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/it-sa-Recap-2025-becongmbh.png","width":850,"height":513,"caption":"DataGerry team at it-sa 2025"},{"@type":"BreadcrumbList","@id":"https:\/\/datagerry.com\/en\/recap-itsa-2025\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/datagerry.com\/en\/home\/"},{"@type":"ListItem","position":2,"name":"it-sa 2025 Recap: Three days of discussions and cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/datagerry.com\/en\/#website","url":"https:\/\/datagerry.com\/en\/","name":"DataGerry","description":"Your IT is driving you nuts?","publisher":{"@id":"https:\/\/datagerry.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/datagerry.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/datagerry.com\/en\/#organization","name":"DataGerry","url":"https:\/\/datagerry.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/datagerry.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/Datagerry.png","contentUrl":"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/Datagerry.png","width":359,"height":108,"caption":"DataGerry"},"image":{"@id":"https:\/\/datagerry.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/DATAGERRY","https:\/\/www.linkedin.com\/company\/datagerry\/"]},{"@type":"Person","@id":"https:\/\/datagerry.com\/en\/#\/schema\/person\/4c268fa52a381d91e25e47fbfeb11f81","name":"Melina Rother","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/8a586590524458bd6067e26b9e6e30791bb656f98fbc6eeb7724daeac9f535ff?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/8a586590524458bd6067e26b9e6e30791bb656f98fbc6eeb7724daeac9f535ff?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8a586590524458bd6067e26b9e6e30791bb656f98fbc6eeb7724daeac9f535ff?s=96&d=mm&r=g","caption":"Melina Rother"},"url":"https:\/\/datagerry.com\/en\/author\/rother\/"}]}},"_links":{"self":[{"href":"https:\/\/datagerry.com\/en\/wp-json\/wp\/v2\/posts\/2951","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/datagerry.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/datagerry.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/datagerry.com\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/datagerry.com\/en\/wp-json\/wp\/v2\/comments?post=2951"}],"version-history":[{"count":16,"href":"https:\/\/datagerry.com\/en\/wp-json\/wp\/v2\/posts\/2951\/revisions"}],"predecessor-version":[{"id":27254196,"href":"https:\/\/datagerry.com\/en\/wp-json\/wp\/v2\/posts\/2951\/revisions\/27254196"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/datagerry.com\/en\/wp-json\/wp\/v2\/media\/2897"}],"wp:attachment":[{"href":"https:\/\/datagerry.com\/en\/wp-json\/wp\/v2\/media?parent=2951"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/datagerry.com\/en\/wp-json\/wp\/v2\/categories?post=2951"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/datagerry.com\/en\/wp-json\/wp\/v2\/tags?post=2951"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}